www.perforce.com Open in urlscan Pro
2606:4700:3108::ac42:28c5  Public Scan

URL: https://www.perforce.com/manuals/p4sag/Content/P4SAG/protections.when_to_set.html
Submission: On November 15 via api from BY — Scanned from US

Form analysis 1 forms found in the DOM

#

<form class="search" action="#">
  <div class="search-bar search-bar-container needs-pie">
    <input class="search-field needs-pie" type="search" aria-label="Search Field" placeholder="Search">
    <div class="search-filter-wrapper"><span class="invisible-label" id="search-filters-label">Filter: </span>
      <div class="search-filter" aria-haspopup="true" aria-controls="sf-content" aria-expanded="false" aria-label="Search Filter" title="All Files" role="button" tabindex="0">
      </div>
      <div class="search-filter-content" id="sf-content">
        <ul>
          <li>
            <button class="mc-dropdown-item" aria-labelledby="search-filters-label filterSelectorLabel-00001"><span id="filterSelectorLabel-00001">All Files</span>
            </button>
          </li>
        </ul>
      </div>
    </div>
    <div class="search-submit-wrapper" dir="ltr">
      <div class="search-submit" title="Search" role="button" tabindex="0"><span class="invisible-label">Submit Search</span>
      </div>
    </div>
  </div>
</form>

Text Content

 * Home
 * How to use this guide 
 * What’s new in the Helix Core Server Administrator Guide 
 * Overview 
 * Install the server 
 * Upgrade the server 
 * Patch the server
 * Configure the server 
 * Work with depots 
 * Secure the server 
   * Secure the server 
   * Workflow to secure the server
   * SSL encrypted connections 
   * Firewalls
   * Authentication options 
   * Helix Authentication Service
   * LDAP authentication 
   * Authentication with password and ticket 
   * Multi-factor authentication
   * Access authorization 
     * Access authorization 
     * When should protections be set?
     * Set protections with p4 protect 
     * Grant access to groups of users
     * Comments in protection tables
     * How protections are implemented
     * Access levels required by Helix Core Server commands
   * Restrict access to changelists
 * Backup and recovery 
 * Monitor the server 
 * Performance tuning 
 * Manage the server and its resources 
 * Customize Helix Core Server: job specifications 
 * Triggers and extensions 
 * How to move a Helix Core Server 
 * Deployment architecture 
 * Work with Git 
 * Helix Core Server (p4d) Reference 
 * Helix Core Server Control (p4dctl) 
 * Protocol levels: server/client 
 * Glossary
 * License statements

Skip To Main Content
Account
Settings

--------------------------------------------------------------------------------

Logout
Helix Core Server Administrator Guide (2024.2)
 * Home
 * How to use this guide»
 * What’s new in the Helix Core Server Administrator Guide»
 * Overview»
 * Install the server»
 * Upgrade the server»
 * Patch the server
 * Configure the server»
 * Work with depots»
 * Secure the server»
 * Backup and recovery»
 * Monitor the server»
 * Performance tuning»
 * Manage the server and its resources»
 * Customize Helix Core Server: job specifications»
 * Triggers and extensions»
 * How to move a Helix Core Server»
 * Deployment architecture»
 * Work with Git»
 * Helix Core Server (p4d) Reference»
 * Helix Core Server Control (p4dctl)»
 * Protocol levels: server/client»
 * Glossary
 * License statements

Account
Settings

--------------------------------------------------------------------------------

Logout
Filter:

 * All Files

Submit Search
 * Home
 * How to use this guide How to use this guide 
 * What’s new in the Helix Core Server Administrator Guide What’s new in the
   Helix Core Server Administrator Guide 
 * Overview Overview 
 * Install the server Install the server 
 * Upgrade the server Upgrade the server 
 * Patch the server
 * Configure the server Configure the server 
 * Work with depots Work with depots 
 * Secure the server Secure the server 
   * Workflow to secure the server
   * SSL encrypted connections SSL encrypted connections 
   * Firewalls
   * Authentication options Authentication options 
   * Helix Authentication Service
   * LDAP authentication LDAP authentication 
   * Authentication with password and ticket Authentication with password and
     ticket 
   * Multi-factor authentication
   * Access authorization Access authorization 
     * When should protections be set?
     * Set protections with p4 protect Set protections with p4 protect 
     * Grant access to groups of users
     * Comments in protection tables
     * How protections are implemented
     * Access levels required by Helix Core Server commands
   * Restrict access to changelists
 * Backup and recovery Backup and recovery 
 * Monitor the server Monitor the server 
 * Performance tuning Performance tuning 
 * Manage the server and its resources Manage the server and its resources 
 * Customize Helix Core Server: job specifications Customize Helix Core Server:
   job specifications 
 * Triggers and extensions Triggers and extensions 
 * How to move a Helix Core Server How to move a Helix Core Server 
 * Deployment architecture Deployment architecture 
 * Work with Git Work with Git 
 * Helix Core Server (p4d) Reference Helix Core Server (p4d) Reference 
 * Helix Core Server Control (p4dctl) Helix Core Server Control (p4dctl) 
 * Protocol levels: server/client Protocol levels: server/client 
 * Glossary
 * License statements

Secure the server > Access authorization > When should protections be set?


WHEN SHOULD PROTECTIONS BE SET?

Run p4 protect immediately after installing Helix Core Server for the first
time. Before the first call to p4 protect, every Helix Core Server user is a
superuser and thus can access and change anything in the depot. The first time a
user runs p4 protect, a protections table is created that gives superuser access
to the user from all IP addresses, and lowers all other users' access level to
write permission on all files from all IP addresses.

The Helix Core Server protections table is stored in the db.protect file in the
server root directory; if p4 protect is first run by an unauthorized user, the
depot can be brought back to its unprotected state by removing this file.

Your search for returned result(s).




Top